Jhimmy Alberth Quisocala Herrera, Fernando Antonio Flores Limo, Abel Alejandro Tasayco-Jala, Isabel Menacho Vargas, Wilfredo Barrientos Farias, Zoila Mercedes Collantes Inga, Eber L. Herrera Palacios
{"title":"基于行为生物识别区块链增强认证层的互联网架构和协议中的安全问题","authors":"Jhimmy Alberth Quisocala Herrera, Fernando Antonio Flores Limo, Abel Alejandro Tasayco-Jala, Isabel Menacho Vargas, Wilfredo Barrientos Farias, Zoila Mercedes Collantes Inga, Eber L. Herrera Palacios","doi":"10.58346/jisis.2023.i3.008","DOIUrl":null,"url":null,"abstract":"Internet security is of paramount importance due to the pervasive nature of the network in modern society. As the globe grows increasingly interconnected, issues like data breaches, unauthorized access, and service disruptions become more common. Safeguarding private data, ensuring uninterrupted communication, and protecting vital services are all essential to establishing confidence and stability in the online world. Internet security is a complex problem to solve due to the interconnected nature of the Internet's Architecture and Protocols (IAP). Due to the wide variety of devices and platforms that can access the Internet, cybercriminals can breach a complex ecosystem. Constant monitoring and flexibility are required due to the rapid development of new attack methods and vulnerabilities. The difficulty lies in balancing implementing new security measures and minimizing disruptions to the user experience, which calls for adaptive and novel approaches. In this paper, the Behavioural Biometric Block Chain-Enhanced Authentication layer (BBB-EAL) framework recommends a static authentication mechanism for end-users and edge servers. This authentication creates a secure and encrypted link between parties. Access tokens are produced via a smart contract, removing the requirement for a trusted third party. This work emphasizes the importance of architecture design and sequence diagrams in representing participant interactions and information sharing. Additionally, it examines the construction of the Machine Learning (ML) model used to recognize KMT dynamics. Simulations indicate that the recommended design improves user authentication in an IAP-enabled environment. The findings demonstrate the ability to evaluate confidence in real time, achieve minimal authentication time, and utilize resources efficiently.","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2023-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Security Issues in Internet Architecture and Protocols Based on Behavioural Biometric Block Chain-Enhanced Authentication Layer\",\"authors\":\"Jhimmy Alberth Quisocala Herrera, Fernando Antonio Flores Limo, Abel Alejandro Tasayco-Jala, Isabel Menacho Vargas, Wilfredo Barrientos Farias, Zoila Mercedes Collantes Inga, Eber L. Herrera Palacios\",\"doi\":\"10.58346/jisis.2023.i3.008\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Internet security is of paramount importance due to the pervasive nature of the network in modern society. As the globe grows increasingly interconnected, issues like data breaches, unauthorized access, and service disruptions become more common. Safeguarding private data, ensuring uninterrupted communication, and protecting vital services are all essential to establishing confidence and stability in the online world. Internet security is a complex problem to solve due to the interconnected nature of the Internet's Architecture and Protocols (IAP). Due to the wide variety of devices and platforms that can access the Internet, cybercriminals can breach a complex ecosystem. Constant monitoring and flexibility are required due to the rapid development of new attack methods and vulnerabilities. The difficulty lies in balancing implementing new security measures and minimizing disruptions to the user experience, which calls for adaptive and novel approaches. In this paper, the Behavioural Biometric Block Chain-Enhanced Authentication layer (BBB-EAL) framework recommends a static authentication mechanism for end-users and edge servers. This authentication creates a secure and encrypted link between parties. Access tokens are produced via a smart contract, removing the requirement for a trusted third party. This work emphasizes the importance of architecture design and sequence diagrams in representing participant interactions and information sharing. Additionally, it examines the construction of the Machine Learning (ML) model used to recognize KMT dynamics. Simulations indicate that the recommended design improves user authentication in an IAP-enabled environment. The findings demonstrate the ability to evaluate confidence in real time, achieve minimal authentication time, and utilize resources efficiently.\",\"PeriodicalId\":36718,\"journal\":{\"name\":\"Journal of Internet Services and Information Security\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-08-31\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Internet Services and Information Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.58346/jisis.2023.i3.008\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"Computer Science\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Internet Services and Information Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.58346/jisis.2023.i3.008","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"Computer Science","Score":null,"Total":0}
Security Issues in Internet Architecture and Protocols Based on Behavioural Biometric Block Chain-Enhanced Authentication Layer
Internet security is of paramount importance due to the pervasive nature of the network in modern society. As the globe grows increasingly interconnected, issues like data breaches, unauthorized access, and service disruptions become more common. Safeguarding private data, ensuring uninterrupted communication, and protecting vital services are all essential to establishing confidence and stability in the online world. Internet security is a complex problem to solve due to the interconnected nature of the Internet's Architecture and Protocols (IAP). Due to the wide variety of devices and platforms that can access the Internet, cybercriminals can breach a complex ecosystem. Constant monitoring and flexibility are required due to the rapid development of new attack methods and vulnerabilities. The difficulty lies in balancing implementing new security measures and minimizing disruptions to the user experience, which calls for adaptive and novel approaches. In this paper, the Behavioural Biometric Block Chain-Enhanced Authentication layer (BBB-EAL) framework recommends a static authentication mechanism for end-users and edge servers. This authentication creates a secure and encrypted link between parties. Access tokens are produced via a smart contract, removing the requirement for a trusted third party. This work emphasizes the importance of architecture design and sequence diagrams in representing participant interactions and information sharing. Additionally, it examines the construction of the Machine Learning (ML) model used to recognize KMT dynamics. Simulations indicate that the recommended design improves user authentication in an IAP-enabled environment. The findings demonstrate the ability to evaluate confidence in real time, achieve minimal authentication time, and utilize resources efficiently.